Review Article Botnet: Classification, Attacks, Detection, Tracing, And
Total Page:16
File Type:pdf, Size:1020Kb
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2009, Article ID 692654, 11 pages doi:10.1155/2009/692654 Review Article Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures Jing Liu,1 Yang Xiao, 1 Kaveh Ghaboosi,2 Hongmei Deng,3 and Jingyuan Zhang1 1 Department of Computer Science, The University of Alabama, Tuscaloosa, AL 35487-0290, USA 2 The Centre for Wireless Communications, University of Oulu, P.O. Box 4500, FI-90014, Finland 3 Intelligent Automation, Inc., Rockville, MD 20855, USA Correspondence should be addressed to Yang Xiao, [email protected] Received 25 December 2008; Revised 17 June 2009; Accepted 19 July 2009 Recommended by Yi-Bing Lin Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges. Copyright © 2009 Jing Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 1. Introduction Fortunately, botnet attacks and the corresponding pre- ventive measures or tracking approaches have been studied The untraceable feature of coordinated attacks is just what by industry and academia in last decades. It is known that hackers/attackers demand to compromise a computer or a botnets have thousands of different implementations, which network for their illegal activities. Once a group of hosts at can be classified into two major categories based on their different locations controlled by a malicious individual or topologies [4]. One typical and the most common type is organization to initiate an attack, one can hardly trace back Internet Relay Chat-(IRC-) based botnets. Because of its cen- to the origin due to the complexity of the Internet. For this tralized architecture, researchers have designed some feasible reason, the increase of events and threats against legitimate countermeasures to detect and destroy such botnets [5, 6]. Internet activities such as information leakage, click fraud, Hence, newer and more sophisticated hackers/attackers start denial of service (DoS) and attack, E-mail spam, etc., has to use Peer to Peer (P2P) technologies in botnets [4, 7]. become a very serious problem nowadays [1]. Those victims P2P botnets are distributed and do not have a central point controlled by coordinated attackers are called zombies or of failure. Compared to IRC-based botnets, they are more bots which derives from the word “robot.” The term of bots difficult to detect and take down [4]. Besides, most of its is commonly referred to software applications running as an existing studies are still in the analysis phase [4, 7]. automated task over the Internet [2]. Under a command and Scholars firstly discovered botnets due to the study on control (C2, or C&C) infrastructure, a group of bots are able Distributed DoS (DDoS) attacks [8]. After that, botnet to form a self-propagating, self-organizing, and autonomous features have been disclosed using probing and Honeypots framework, named botnet [3]. Generally, to compromise a [9–11]. Levy [12] mentioned that spammers increasingly series of systems, the botnet’s master (also called as herder relied on bots to generate spam messages, since bots can hide or perpetrator) will remotely control bots to install worms, their identities [13]. To identify and block spam, blacklists Trojan horses, or backdoors on them [3]. The majority of are widely used in practice. Jung and Sit [14] found that those victims are running Microsoft Windows operating 80% of spammers could be detected by blacklists of MIT system [3]. The process of stealing host resources to form a in 2004. Besides, blacklists also impact on other hostile botnet is so called “scrumping” [3]. actions. Through examining blacklist abuse by botnet’s 2 EURASIP Journal on Wireless Communications and Networking masters, Ramachandran et al. [15] noted that those masters 2.1. Formation and Exploitation. To illustrate the formation with higher premiums on addresses would not present on and exploitation, we take a spamming botnet as an example. blacklists. Thus, only deploying blacklists may be not enough A typical formation of botnet can be described by the to address the botnet problem. following steps [3], as shown in Figure 1. So far, industry and much of academia are still engaged (1) The perpetrator of botnet sends out worms or viruses in damage control via patch-management rather than to infect victims’ machines, whose payloads are bots. fundamental problem solving. In fact, without innovative approaches to removing the botnet threat, the full utility of (2) The bots on the infected hosts log into an IRC server the Internet for human beings will still be a dream. The major or other communications medium, forming a botnet. objectiveofthispaperistoexploitopenissuesinbotnet (3) Spammer makes payment to the owner of this botnet detection and preventive measures through exhaustive anal- to gain the access right. ysis of botnets features and existing researches. (4) Spammer sends commands to this botnet to order the The rest of this paper is organized as follows. In Section 2, bots to send out spam. we provide a background introduction as well as the botnet classification. Section 3 describes the relevant attacks. (5) The infected hosts send the spam messages to various Section 4 elaborates on the detection and tracing mecha- mail servers in the Internet. nisms. We introduce preventive measures in Section 5.The Botnets can be exploited for criminally purposes or just conclusion and future challenges are discussed in Section 6. for fun, depending on the individuals. The next section will go into the details of various exploitations. 2. Classification 2.2. Botnet Lifecycle. Figure 2 shows the lifecycle of a botnet Botnets are emerging threats with billions of hosts worldwide and a single bot [16]. infected. Bots can spread over thousands of computers at a very high speed as worms do. Unlike worms, bots in a botnetareabletocooperatetowardsacommonmalicious 2.3. IRC-Based Bot. IRC is a protocol for text-based instant purpose. For that reason, botnets nowadays play a very messaging among people connected with the Internet. It is important role in the Internet malware epidemic [16]. based on Client/Server (C/S) model but suited for distributed Many works try to summarize their taxonomy [17, 18], environment as well [18]. Typical IRC severs are intercon- using properties such as the propagation mechanism, the nected and pass messages from one to another [18]. One can topology of C2 infrastructure used, the exploitation strategy, connect with hundreds of clients via multiple servers. It is or the set of commands available to the perpetrator. So so-called multiple IRC (mIRC), in which communications far, botnet’s master often uses IRC protocol to control and among clients and a server are pushed to those who are manage the bots. For the sake of reducing botnet’s threat connected to the channel. The functions of IRC-based bots efficiently, scholars and researchers emphasize their studies include managing access lists, moving files, sharing clients, on detecting IRC-based botnets. Generally speaking, the sharing channel information, and so on [18]. Major parts of academic literature on botnet detection is sparse. In [19], a typical IRC bot attack are showed in Figure 3 [18]. Strayer et al. presented some metrics by flow analysis on (i) Bot is typically an executable file triggered by a detecting botnets. After filtering IRC session out of the traffic, specific command from the IRC sever. Once a bot flow-based methods were applied to discriminate malicious is installed on a victim host, it will make a copy from benign IRC channels. The methods proposed by [20, into a configurable directory and let the malicious 21] combined both application and network layer analysis. program to start with the operating system. Cooke et al. [22] dealt with IRC activities at the application Consider Windows as an instance, the bots sized layer, using information coming from the monitoring of no more than 15 kb are able to add into the system network activities. Some authors had introduced machine registry (HKEY LOCAL MACHINE\SOFTWARE learning techniques into botnet detection [23], since they led \Microsoft\Windows\CurrentVerssion\Run\)[18]. a better way to characterize botnets. Currently, honeynets Generally, bots are just the payload of worms or the and Intrusion Detection System (IDS) are two major tech- way to open a backdoor [18]. niques to prevent their attacks. Honeynets can be deployed (ii) Control channel is a secured IRC channel set up by the in both distributed and local context [9]. They are capable attacker to manage all the bots. of providing botnet attacking information but cannot tell the details such as whether the victim has a certain worm (iii) IRC Server may be a compromised machine or even a [9]. The IDS uses the signatures or behavior of existing legitimate provider for public service. botnets for reference to detect potential attacks. Thus, to (iv) Attacker is the one who control the IRC bot attack. summarize the characteristics of botnets is significant for The attacker’s operations have four stages [16]. secure networks. To the best of our knowledge, we have not found any other work about anomaly-based detection for (1) The first one is the Creation Stage, where the attacker botnets. Before going to the discussion of botnet attacks and may add malicious code or just modify an existing preventive measures, we will introduce some relevant terms one out of numerous highly configurable bots over and classification of bots in the rest of this section.